CN107239680B - A kind of couple of user logs in the method and device for carrying out risk assessment - Google Patents
A kind of couple of user logs in the method and device for carrying out risk assessment Download PDFInfo
- Publication number
- CN107239680B CN107239680B CN201710362096.XA CN201710362096A CN107239680B CN 107239680 B CN107239680 B CN 107239680B CN 201710362096 A CN201710362096 A CN 201710362096A CN 107239680 B CN107239680 B CN 107239680B
- Authority
- CN
- China
- Prior art keywords
- user
- currently
- attribute field
- logged
- logs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
- G06F16/1815—Journaling file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F16/00 and subgroups
- G06F2216/03—Data mining
Abstract
The embodiment of the present invention provides a kind of couple of user and logs in the method and device for carrying out risk assessment, which comprises obtains the daily record data that user currently logs in;According to the daily record data that the user currently logs in, the attribute field information that user's unique identities mark UID and user currently log in is obtained;According to the UID of acquisition, the corresponding pre-set user model of UID is obtained from database, is stored with the corresponding several attribute fields of UID in the pre-set user model;The respective attributes field in attribute field information and the pre-set user model currently logged in using the user, obtains the risk factor that the user currently logs in;The risk factor currently logged according to the user currently logs in the user and carries out risk assessment.Above-mentioned technical proposal has the following beneficial effects: the user model for only each user that database needs to store, and required memory space greatly reduces, and the big speed raising of process of risk assessment, also achieves the risk assessment and judgement of automation.
Description
Technical field
The method and dress for carrying out risk assessment are logged in the present invention relates to network technique field more particularly to a kind of couple of user
It sets.
Background technique
User logs in: large-scale website can have many consumers, and user is in order to use required for oneself account on website
The operation of confirmation identity is called login.
It logs in and contains many information in log, such as login time, login mode, logging device, entry address, login browsing
Device, logging request duration, login result, the information such as login account.The log-on message of same account is stored entirely in database
In.When users log on, log is taken in lane database, then compares the current log for logging in log and taking-up one by one.And according to this
Whether abnormal determine this time to log in.
The prior art stores its all login log by table name of A in the database for account A.Every time when A is logged in
When, all logs are taken out from database, and word for word section compares one by one by this log L and database journal.To each field
A critical value (C1, C2, C3 ...) is set, when the ratio that a field in L occurs in database journal corresponding field is low
When critical value, this field is determined as exception.All fields are so judged, if the ratio that abnormal field accounts for field sum is high
It is then this time logged in when total critical value C and is determined as exception.
Prior art needs take out all logs from database, this is that can not connect for the website of huge account system
It receives, it is extremely time-consuming because operating thus.It is also very time-consuming that all logs are needed to be traversed in decision process.And the method excessively relies on
The critical value (C, C1, C2 ...) of artificial settings, causes the degree of automation not high enough, responds not prompt enough.
Summary of the invention
The embodiment of the present invention provides a kind of couple of user and logs in the method and device for carrying out risk assessment, to accelerate user to log in
The speed of risk assessment, while improving the degree of automation that user logs in risk assessment.
On the one hand, the method for carrying out risk assessment, the method packet are logged in the embodiment of the invention provides a kind of couple of user
It includes:
Obtain the daily record data that user currently logs in;
According to the daily record data that the user currently logs in, obtains user's unique identities mark UID and user currently logs in
Attribute field information;
According to the UID of acquisition, the corresponding pre-set user model of the UID, the default use are obtained from database
The corresponding several attribute fields of the UID are stored in the model of family;
The respective attributes field in attribute field information and the pre-set user model currently logged in using the user,
Obtain the risk factor that the user currently logs in;
The risk factor currently logged according to the user currently logs in the user and carries out risk assessment.
On the other hand, the device for carrying out risk assessment, described device are logged in the embodiment of the invention provides a kind of couple of user
Include:
Daily record data acquiring unit, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit, the daily record data for currently being logged according to the user obtain user's unique identities
The attribute field information that mark UID and user currently log in;
It is corresponding pre- to obtain the UID for the UID according to acquisition from database for user model acquiring unit
If user model, the corresponding several attribute fields of the UID are stored in the pre-set user model;
Risk factor acquiring unit, attribute field information and the pre-set user for currently being logged in using the user
Respective attributes field in model obtains the risk factor that the user currently logs in;
Risk assessment unit, the risk factor for currently being logged according to the user currently log in progress to the user
Risk assessment.
Above-mentioned technical proposal has the following beneficial effects: the user's mould for only each user that database needs to store
Type, required memory space greatly reduce, and the big speed raising of process of risk assessment, also achieve the risk of automation
Assessment and judgement.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is that a kind of couple of user of the embodiment of the present invention logs in the method flow diagram for carrying out risk assessment;
Fig. 2 is that a kind of couple of user of the embodiment of the present invention logs in the apparatus structure schematic diagram for carrying out risk assessment;
Fig. 3 is that another kind of the embodiment of the present invention logs in the apparatus structure schematic diagram for carrying out risk assessment to user.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, logging in the method flow diagram for carrying out risk assessment, the side for a kind of couple of user of the embodiment of the present invention
Method includes:
101, the daily record data that user currently logs in is obtained;
102, the daily record data currently logged according to the user, obtains user's unique identities mark UID and user is current
The attribute field information of login;
103, according to the UID of acquisition, the corresponding pre-set user model of the UID is obtained from database, it is described pre-
If being stored with the corresponding several attribute fields of the UID in user model;
104, the respective attributes in attribute field information and the pre-set user model currently logged in using the user
Field obtains the risk factor that the user currently logs in;
105, the risk factor currently logged according to the user currently logs in the user and carries out risk assessment.
Preferably, the attribute field includes one of following or any combination: when logentry, logging device, login
Between, login mode, entry address, log in browser, logging request duration, login result, login account.
Preferably, each attribute that each attribute field includes also is stored in the corresponding pre-set user model of the UID
Field sorting item and its rate of specific gravity.
Preferably, the phase in the attribute field information currently logged in using the user and the pre-set user model
Attribute field is answered, the risk factor that the user currently logs in is obtained, comprising:
For each attribute field information that the user currently logs in, in the respective attributes of the pre-set user model
Corresponding attribute field sorting item and its rate of specific gravity are searched in field, using the rate of specific gravity found divided by the pre-set user mould
The sum of the rate of specific gravity for all properties field sorting item that respective attributes field in type includes, obtains the attribute field sorting item
Score;
Calculate point for the corresponding each attribute field sorting item of all properties field information that the user currently logs in
Number average value, the risk factor which is currently logged in as the user.
Preferably, the method also includes: the daily record data currently logged according to the user is to corresponding in database
Pre-set user model is updated, comprising: the attribute field information currently logged according to the user is in the pre-set user mould
Corresponding attribute field sorting item and its rate of specific gravity are searched in the respective attributes field of type, the rate of specific gravity found are added 1, and will
The rate of specific gravity for all properties field sorting item that the respective attributes field includes is multiplied by preset weight coefficient.
Corresponding to above method embodiment, commented as shown in Fig. 2, being logged in for a kind of couple of user of the embodiment of the present invention and carrying out risk
The apparatus structure schematic diagram estimated, described device include:
Daily record data acquiring unit 21, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit 22, the daily record data for currently being logged according to the user obtain the unique body of user
The attribute field information that part mark UID and user currently log in;
It is corresponding to obtain the UID for the UID according to acquisition from database for user model acquiring unit 23
Pre-set user model is stored with the corresponding several attribute fields of the UID in the pre-set user model;
Risk factor acquiring unit 24, attribute field information and the default use for currently being logged in using the user
Respective attributes field in the model of family obtains the risk factor that the user currently logs in;
Risk assessment unit 25, the risk factor for currently being logged according to the user currently log into the user
Row risk assessment.
Preferably, the attribute field includes one of following or any combination: when logentry, logging device, login
Between, login mode, entry address, log in browser, logging request duration, login result, login account.
Preferably, each attribute that each attribute field includes also is stored in the corresponding pre-set user model of the UID
Field sorting item and its rate of specific gravity.
Preferably, the risk factor acquiring unit 24, specifically for each category currently logged in for the user
Property field information, searches corresponding attribute field sorting item and its specific gravity in the respective attributes field of the pre-set user model
Value, all properties field point for including divided by the respective attributes field in the pre-set user model using the rate of specific gravity found
The sum of rate of specific gravity of category obtains the score of the attribute field sorting item;Calculate all properties that the user currently logs in
The score average of the corresponding each attribute field sorting item of field information, the score average is current as the user
The risk factor of login.
Preferably, as shown in figure 3, logging in the apparatus structure for carrying out risk assessment to user for another kind of the embodiment of the present invention
Schematic diagram, described device further include: user model updating unit 26, the daily record data pair for currently being logged according to the user
Corresponding pre-set user model is updated in database, specifically for the attribute field information currently logged according to the user
Corresponding attribute field sorting item and its rate of specific gravity are searched in the respective attributes field of the pre-set user model, will be found
Rate of specific gravity add 1, and the rate of specific gravity for all properties field sorting item for including by the respective attributes field is multiplied by preset weight
Coefficient.
Above-mentioned technical proposal has the following beneficial effects: the user's mould for only each user that database needs to store
Type, required memory space greatly reduce, and the big speed raising of process of risk assessment, also achieve the risk of automation
Assessment and judgement.
The embodiment of the present invention is described in detail below by way of application example:
We cannot all take log in the account system of large-scale website, improve the speed judged to method
And accuracy, and also to promote the degree of automation.Therefore the resulting user model of refined data is a choosing well
It selects.
Application example of the present invention constructs the user model that user's unique identities mark (UID) is major key for each user
And it is stored in database profession.User model is constantly in variation.All the time all in the login log of the streaming of generation, through sieving
Choosing, which generates, logs in log, and according to certain algorithm, can use user model and when time logon data carrys out more new model.When having
When needing to judge whether it is the logon data that malice logs in, read user model from lane database and according to user model and
Data obtain judging result according to certain mathematical programming operation.
If logging in has UID and this logentry logged in, the attribute that two users of logging device currently log in log
Field information.Then the structure of user model can be such structure:
This is a possible structure of user model.Store UID first, the corresponding pre-set user model of the UID
In be also stored with each attribute field sorting item and its rate of specific gravity that each attribute field includes.In entry (entrance) Xiang Licun
Storing up used each logentry and its rate of specific gravity, (rate of specific gravity that such as mailbox logs in is 32.2, and the specific gravity for using app to log in
Value is only 0.6).Next the facility information and its rate of specific gravity logged in recently is stored.
How such user model is constructed? convection type logs in Log Filter, qualified logon data quilt first
Write as the form of { UID:23142, entry:mail, device:pc }.Then according to the pre-set user in UID reading database
Model creates if Non-precondition user model.If this entry logged in is mail, then the entry in pre-set user model
In the value of mail add 1 (no then newly-built mail:1), then again to all values in entry multiplied by 0.995 (weight coefficient);
This step is the importance for the login for making user nearest greater than login a long time ago, and also has control data scale
Effect.Device is handled in this approach, then stores pre-set user model to database, completes to update operation.
The method of risk assessment: the daily record data currently logged according to user obtains user's unique identities mark UID and use
The data to be assessed are write as { UID:23142, entry:app, device:Galaxy by the attribute field information that family currently logs in
S7 } form.UID corresponding pre-set user model (such as above-mentioned pre-set user model, the default use are read from lane database
The corresponding several attribute fields of the UID are stored in the model of family);The attribute field information that is currently logged in using the user and
Respective attributes field in the pre-set user model obtains the risk factor that the user currently logs in: to entry field ratio
Right: the entry specifically logged in is app, then the corresponding rate of specific gravity 0.6 of app is found in entry, pre-set user model, then use
0.6 divided by rates of specific gravity all under entry sum: 0.6/ (32.2+2.1+0.6)=0.0017 (point).It is current to calculate the user
The score average of the corresponding attribute field sorting item of all properties field information of login, using the score average as described in
The risk factor that user currently logs in: same operation is done to device and obtains entry score: 40.4/ (75.9+40+
40.4) risk factor for=0.2584 (point), then currently logging in the average value of all scores as the user
(0.1301).Finally, the risk factor currently logged according to the user, which currently logs in the user, carries out risk assessment: wind
Dangerous coefficient is bigger closer to 0 risk, conversely, the more big then risk of risk factor is smaller.
Due to streaming log speed quickly, measure very big, the model of each user will be a gradually perfect process, mould
The time that type is established is longer, then risk assessment is more accurate.
Application example technical solution bring of the present invention is the utility model has the advantages that in the method, database needs store only
It is the user model of each user, required memory space greatly reduces, and the big speed raising of process of risk assessment, also
Realize the risk assessment and judgement of automation.
It should be understood that the particular order or level of the step of during disclosed are the examples of illustrative methods.Based on setting
Count preference, it should be appreciated that in the process the step of particular order or level can be in the feelings for the protection scope for not departing from the disclosure
It is rearranged under condition.Appended claim to a method is not illustratively sequentially to give the element of various steps, and not
It is to be limited to the particular order or level.
In above-mentioned detailed description, various features are combined together in single embodiment, to simplify the disclosure.No
This published method should be construed to reflect such intention, that is, the embodiment of theme claimed needs to compare
The more features of the feature clearly stated in each claim.On the contrary, as appended claims is reflected
Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appended claims
It is hereby expressly incorporated into detailed description, wherein each claim is used as alone the individual preferred embodiment of the present invention.
For can be realized any technical staff in the art or using the present invention, above to disclosed embodiment into
Description is gone.To those skilled in the art;The various modifications mode of these embodiments will be apparent from, and this
The General Principle of text definition can also be suitable for other embodiments on the basis of not departing from the spirit and scope of the disclosure.
Therefore, the disclosure is not limited to embodiments set forth herein, but most wide with principle disclosed in the present application and novel features
Range is consistent.
Description above includes the citing of one or more embodiments.Certainly, in order to describe above-described embodiment and description portion
The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each implementation
Example can do further combinations and permutations.Therefore, embodiment described herein is intended to cover fall into the appended claims
Protection scope in all such changes, modifications and variations.In addition, with regard to term used in specification or claims
The mode that covers of "comprising", the word is similar to term " includes ", just as " including " solved in the claims as transitional word
As releasing.In addition, the use of any one of specification in claims term "or" being to indicate " non-exclusionism
Or ".
Those skilled in the art will also be appreciated that the various illustrative components, blocks that the embodiment of the present invention is listed
(illustrative logical block), unit and step can by electronic hardware, computer software, or both knot
Conjunction is realized.For the replaceability (interchangeability) for clearly showing that hardware and software, above-mentioned various explanations
Property component (illustrative components), unit and step universally describe their function.Such function
It can be that the design requirement for depending on specific application and whole system is realized by hardware or software.Those skilled in the art
Can be can be used by various methods and realize the function, but this realization is understood not to for every kind of specific application
Range beyond protection of the embodiment of the present invention.
Various illustrative logical blocks or unit described in the embodiment of the present invention can by general processor,
Digital signal processor, specific integrated circuit (ASIC), field programmable gate array or other programmable logic devices, discrete gate
Or transistor logic, discrete hardware components or above-mentioned any combination of design carry out implementation or operation described function.General place
Managing device can be microprocessor, and optionally, which may be any traditional processor, controller, microcontroller
Device or state machine.Processor can also be realized by the combination of computing device, such as digital signal processor and microprocessor,
Multi-microprocessor, one or more microprocessors combine a digital signal processor core or any other like configuration
To realize.
The step of method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor execute it is soft
The combination of part module or the two.Software module can store in RAM memory, flash memory, ROM memory, EPROM storage
Other any form of storaging mediums in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this field
In.Illustratively, storaging medium can be connect with processor, so that processor can read information from storaging medium, and
It can be to storaging medium stored and written information.Optionally, storaging medium can also be integrated into the processor.Processor and storaging medium can
To be set in asic, ASIC be can be set in user terminal.Optionally, processor and storaging medium also can be set in
In different components in the terminal of family.
In one or more exemplary designs, above-mentioned function described in the embodiment of the present invention can be in hardware, soft
Part, firmware or any combination of this three are realized.If realized in software, these functions be can store and computer-readable
On medium, or it is transferred on a computer readable medium in the form of one or more instructions or code forms.Computer readable medium includes electricity
Brain storaging medium and convenient for so that computer program is allowed to be transferred to from a place telecommunication media in other places.Storaging medium can be with
It is that any general or special computer can be with the useable medium of access.For example, such computer readable media may include but
It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage devices or other
What can be used for carry or store with instruct or data structure and it is other can be by general or special computer or general or specially treated
The medium of the program code of device reading form.In addition, any connection can be properly termed computer readable medium, example
Such as, if software is to pass through a coaxial cable, fiber optic cables, double from a web-site, server or other remote resources
Twisted wire, Digital Subscriber Line (DSL) are defined with being also contained in for the wireless way for transmitting such as example infrared, wireless and microwave
In computer readable medium.The disk (disk) and disk (disc) includes compress disk, radium-shine disk, CD, DVD, floppy disk
And Blu-ray Disc, disk is usually with magnetic replicate data, and disk usually carries out optically replicated data with laser.Combinations of the above
Also it may be embodied in computer readable medium.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (6)
1. a kind of couple of user logs in the method for carrying out risk assessment, which is characterized in that the described method includes:
Obtain the daily record data that user currently logs in;
According to the daily record data that the user currently logs in, the category that user's unique identities mark UID and user currently log in is obtained
Property field information;
According to the UID of acquisition, the corresponding pre-set user model of the UID, the pre-set user mould are obtained from database
Each attribute field sorting item that the corresponding several attribute fields of the UID and each attribute field include is stored in type
And its rate of specific gravity;
The respective attributes field in attribute field information and the pre-set user model currently logged in using the user is obtained
The risk factor that the user currently logs in;
The risk factor currently logged according to the user currently logs in the user and carries out risk assessment;
Wherein, the respective attributes in the attribute field information currently logged in using the user and the pre-set user model
Field obtains the risk factor that the user currently logs in, comprising:
For each attribute field information that the user currently logs in, in the respective attributes field of the pre-set user model
It is middle to search corresponding attribute field sorting item and its rate of specific gravity, using the rate of specific gravity found divided by the pre-set user model
The respective attributes field all properties field sorting item that includes the sum of rate of specific gravity, obtain point of the attribute field sorting item
Number;
The score for calculating the corresponding each attribute field sorting item of all properties field information that the user currently logs in is flat
Mean value, the risk factor which is currently logged in as the user.
2. the method for carrying out risk assessment is logged in user as described in claim 1, which is characterized in that the attribute field includes
One of following or any combination: logentry, logging device, login time, login mode, entry address, log in browser,
Logging request duration, login result, login account.
3. the method for carrying out risk assessment is logged in user as described in claim 1, which is characterized in that the method also includes:
The daily record data currently logged according to the user is updated pre-set user model corresponding in database, specific to wrap
Include: the attribute field information currently logged according to the user is searched pair in the respective attributes field of the pre-set user model
The rate of specific gravity found is added 1, and owned what the respective attributes field included by the attribute field sorting item and its rate of specific gravity answered
The rate of specific gravity of attribute field sorting item is multiplied by preset weight coefficient.
4. a kind of couple of user logs in the device for carrying out risk assessment, which is characterized in that described device includes:
Daily record data acquiring unit, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit, the daily record data for currently being logged according to the user obtain user's unique identities mark
The attribute field information that UID and user currently log in;
User model acquiring unit obtains the corresponding default use of the UID for the UID according to acquisition from database
Family model is stored with the corresponding several attribute fields of the UID and each attribute field packet in the pre-set user model
Each attribute field sorting item and its rate of specific gravity included;
Risk factor acquiring unit, attribute field information and the pre-set user model for currently being logged in using the user
In respective attributes field, obtain the risk factor that the user currently logs in;
Risk assessment unit, the risk factor for currently being logged according to the user, which currently logs in the user, carries out risk
Assessment;
Wherein, the risk factor acquiring unit is believed specifically for each attribute field currently logged in for the user
Breath, searches corresponding attribute field sorting item and its rate of specific gravity in the respective attributes field of the pre-set user model, uses
The all properties field sorting item that the rate of specific gravity found includes divided by the respective attributes field in the pre-set user model
The sum of rate of specific gravity obtains the score of the attribute field sorting item;Calculate all properties field letter that the user currently logs in
The score average for ceasing corresponding each attribute field sorting item, which is currently logged in as the user
Risk factor.
5. the device for carrying out risk assessment is logged in user as claimed in claim 4, which is characterized in that the attribute field includes
One of following or any combination: logentry, logging device, login time, login mode, entry address, log in browser,
Logging request duration, login result, login account.
6. the device for carrying out risk assessment is logged in user as claimed in claim 4, which is characterized in that described device further include:
User model updating unit, the daily record data for currently being logged according to the user is to default use corresponding in database
Family model is updated, specifically for the attribute field information that is currently logged according to the user in the pre-set user model
Corresponding attribute field sorting item and its rate of specific gravity are searched in respective attributes field, the rate of specific gravity found is added 1, and by the phase
The rate of specific gravity for all properties field sorting item for answering attribute field to include is multiplied by preset weight coefficient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710362096.XA CN107239680B (en) | 2017-05-22 | 2017-05-22 | A kind of couple of user logs in the method and device for carrying out risk assessment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710362096.XA CN107239680B (en) | 2017-05-22 | 2017-05-22 | A kind of couple of user logs in the method and device for carrying out risk assessment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107239680A CN107239680A (en) | 2017-10-10 |
CN107239680B true CN107239680B (en) | 2019-09-06 |
Family
ID=59984545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710362096.XA Active CN107239680B (en) | 2017-05-22 | 2017-05-22 | A kind of couple of user logs in the method and device for carrying out risk assessment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107239680B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769005B (en) * | 2018-05-25 | 2021-06-04 | 深圳市量智信息技术有限公司 | WEB system of network space vulnerability merging platform |
CN110166438B (en) * | 2019-04-19 | 2022-03-18 | 平安科技(深圳)有限公司 | Account information login method and device, computer equipment and computer storage medium |
CN110493181B (en) * | 2019-07-05 | 2023-04-07 | 中国平安财产保险股份有限公司 | User behavior detection method and device, computer equipment and storage medium |
CN111988278B (en) * | 2020-07-23 | 2022-07-29 | 微梦创科网络科技(中国)有限公司 | Abnormal user determination method and device based on user geographical location log |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149829A (en) * | 2006-09-22 | 2008-03-26 | 阿里巴巴公司 | Client data centralized processing method and system |
CN103581120A (en) * | 2012-07-24 | 2014-02-12 | 阿里巴巴集团控股有限公司 | Method and device for recognizing user risks |
CN103886250A (en) * | 2012-12-19 | 2014-06-25 | 中国移动通信集团甘肃有限公司 | Data processing method, device, controller and system oriented to business support system |
CN105528535A (en) * | 2015-12-25 | 2016-04-27 | 北京奇虎科技有限公司 | Log information based user behavior analysis method and apparatus |
CN105763505A (en) * | 2014-12-15 | 2016-07-13 | 阿里巴巴集团控股有限公司 | Operation method and device based on user account |
CN105809035A (en) * | 2016-03-07 | 2016-07-27 | 南京邮电大学 | Android application real-time behavior based malicious software detection method and system |
CN105912729A (en) * | 2016-05-19 | 2016-08-31 | 华南理工大学 | Three-dimensional time sequence dynamic model based mobile phone game recommendation system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8402141B2 (en) * | 2004-09-28 | 2013-03-19 | International Business Machines Corporation | Gracefully reestablishing an expired browser session |
-
2017
- 2017-05-22 CN CN201710362096.XA patent/CN107239680B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149829A (en) * | 2006-09-22 | 2008-03-26 | 阿里巴巴公司 | Client data centralized processing method and system |
CN103581120A (en) * | 2012-07-24 | 2014-02-12 | 阿里巴巴集团控股有限公司 | Method and device for recognizing user risks |
CN103886250A (en) * | 2012-12-19 | 2014-06-25 | 中国移动通信集团甘肃有限公司 | Data processing method, device, controller and system oriented to business support system |
CN105763505A (en) * | 2014-12-15 | 2016-07-13 | 阿里巴巴集团控股有限公司 | Operation method and device based on user account |
CN105528535A (en) * | 2015-12-25 | 2016-04-27 | 北京奇虎科技有限公司 | Log information based user behavior analysis method and apparatus |
CN105809035A (en) * | 2016-03-07 | 2016-07-27 | 南京邮电大学 | Android application real-time behavior based malicious software detection method and system |
CN105912729A (en) * | 2016-05-19 | 2016-08-31 | 华南理工大学 | Three-dimensional time sequence dynamic model based mobile phone game recommendation system |
Non-Patent Citations (1)
Title |
---|
登录账号安全管理;阎焯;《计算机光盘软件与应用》;20120708(第13期);30-32 |
Also Published As
Publication number | Publication date |
---|---|
CN107239680A (en) | 2017-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107239680B (en) | A kind of couple of user logs in the method and device for carrying out risk assessment | |
JP5443513B2 (en) | Method and system for handling cookies across domains | |
CN103297435B (en) | A kind of abnormal access behavioral value method and system based on WEB daily record | |
CN103647800B (en) | Recommend the method and system of application resource | |
CN105138555B (en) | A kind of multilingual international loading method of webpage and device | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN109687991A (en) | User behavior recognition method, apparatus, equipment and storage medium | |
CN107122377A (en) | Automatic Adaptation Data collection and storage assembly | |
CN106339469A (en) | Method and device for recommending data | |
CN107070940B (en) | Method and device for judging malicious login IP address from streaming login log | |
CN102640144A (en) | Processes and systems for collaborative manipulation of data | |
CN102316167B (en) | Website recommending method, system thereof and network server | |
CN109040073A (en) | A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour | |
CN103780625B (en) | User interest finds method and apparatus | |
CN108734510B (en) | Advertisement recommendation method and system based on attribute matching | |
CN109388614A (en) | A kind of method, system and the equipment of catalogue file number quota | |
CN110138747A (en) | A kind of method and system for verifying account logging state | |
CN107729375A (en) | A kind of method and device of daily record data sequence | |
CN109376192A (en) | A kind of user retains analysis method, device, electronic equipment and storage medium | |
CN109325171A (en) | User interest analysis method and system based on domain knowledge | |
CN107807793B (en) | The storage of data copy isomery and access method in distributed computer storage system | |
CN104753758B (en) | A kind of information attribute recognition methods and device | |
CN107707621A (en) | A kind of method and device for realizing intelligent buffer | |
CN106650414B (en) | User authority management method and system | |
CN108897886A (en) | Page display method calculates equipment and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |